An intrusion intention analysis algorithm based on attack graph

被引:0
|
作者
Zhu Z. [1 ]
Chai G. [2 ]
机构
[1] Equipment and Training Management Center (Information Center), Quzhou College of Technology, Quzhou
[2] College of Electrical and Information Engineering, Quzhou University, Quzhou
关键词
Attack graph; Intrusion intention; Network security; Recognition algorithm;
D O I
10.46300/9106.2021.15.71
中图分类号
学科分类号
摘要
The discovery of intrusion intention is one of the challenging tasks faced by network security managers. To detect intrusion detections, this paper presents a domain-device attack graph, and collects and analyzes the underlying data of the network topology. On this basis, the attack graph Map was quantified by the Bayesian theory. The minimum weight spanning tree (Min-WFS) algorithm was adopted to automatically recognize the calculation cost of key devices in the network topology, providing an important basis for network maintenance. Experimental results show that the intrusion intentions can be effectively identified with the aid of the quantified domain-device attack graph Map, and this identification method is easy to implement. © 2021, North Atlantic University Union NAUN. All rights reserved.
引用
收藏
页码:643 / 650
页数:7
相关论文
共 50 条
  • [1] Network intrusion intention analysis model based on Bayesian attack graph
    Luo Z.
    Yang X.
    Liu J.
    Xu R.
    1600, Editorial Board of Journal on Communications (41): : 160 - 169
  • [2] Research of Automatic Recognition Double Layers Intrusion Intention Algorithm Based on Attack Graph
    Wang Guangze
    Wang Peng
    Luo Zhiyong
    Zhu Suxia
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 183 - 191
  • [3] Attack Graph Algorithm in the Application of Intrusion Detection System
    Luo Zhiyong
    You Bo
    Xu Jiazhong
    Yu Guixin
    Liu Yahui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 249 - 256
  • [4] Study of SDN intrusion intent identification algorithm based on Bayesian attack graph
    Luo, Zhiyong
    Zhang, Yu
    Wang, Qing
    Song, Weiwei
    Tongxin Xuebao/Journal on Communications, 2023, 44 (04): : 216 - 225
  • [5] Intrusive intention recognition based on attack path graph
    Peng, Wu
    Hu, Chang-Zhen
    Yao, Shu-Ping
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2010, 30 (09): : 1077 - 1081
  • [6] An Intrusion Detection Algorithm Based on Feature Graph
    Yu, Xiang
    Tian, Zhihong
    Qiu, Jing
    Su, Shen
    Yan, Xiaoran
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 61 (01): : 255 - 273
  • [7] Research of intrusive intention self-recognition algorithm based on three-tier attack graph
    Luo, Zhiyong
    You, Bo
    Yu, Guixin
    Su, Jie
    ICIC Express Letters, Part B: Applications, 2015, 6 (06): : 1575 - 1580
  • [8] Intrusion intention recognition and response based on weighed plan knowledge graph
    Cai, Zengyu
    Zhang, Qikun
    Zhang, Ran
    Gan, Yong
    Cai, Zengyu, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18): : 151 - 157
  • [9] A MSPCA based Intrusion Detection Algorithm for Detection of DDoS Attack
    Chen, Zhaomin
    Yeo, Chai Kiat
    Francis, Bu Sung Lee
    Lau, Chiew Tong
    2015 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2015,
  • [10] A New Alert Correlation Algorithm Based on Attack Graph
    Roschke, Sebastian
    Cheng, Feng
    Meinel, Christoph
    COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS, 2011, 6694 : 58 - 67